We had a great talk about the CyberX's expertise in industrial and operational technology (OT) security and the recent acquisition by Microsoft. This is a great combination for the worldwide effort to secure energy, in all forms, from potential hackers bent on destruction. This potential threat from terrorists, and hostile governments, bent on imposing their will is a security disaster waiting to happen. It is also a potential environmental disaster of unimaginable consequences. This should get the attention of board of directors working in the electrical generation, E&P, downstream, upstream and midstream markets. Just imagine valves, pumps, turbines, or other physical control surfaces being knocked out.

 ESG in the energy market has become demanded by investors, and consumers alike. Capital has been tied to the ESG performance and directions of corporations. (That gets a CEO and Board's attention) Phil and I covered the Triton attack that is a great example of what could happen. The article is listed in the notes below. If corporations want to brag about their ESG, and concern for their shareholder's investments, they should document the steps they have taken to secure the assets they have been entrusted.

Phil, thank you for stopping by our place to discuss the CyberX team, and their capabilities. We had fun, and look forward to our next visit, and hearing how CyberX and Microsoft secure more energy installations- Stu



Phil neray

VP of IoT & Industrial Cybersecurity

Founded by blue-team experts with a track record of defending critical national infrastructure, CyberX provides the most widely-deployed platform for continuously reducing IoT/OT risk.


CHANCES ARE, YOU ALREADY
HAVE MALWARE IN YOUR PIPELINE

According to the Ponemon Institute, nearly 70% of oil & gas organizations suffered a security compromise resulting in loss of confidential information or operational disruption in their ICS/SCADA environments, during a recent 12-month period.

And 59% of oil & gas cybersecurity managers believe there’s greater risk in IoT and ICS than IT environments.

In the TRITON attack on a petrochemical facility in Saudi Arabia, cyberattackers developed custom malware to target Safety Instrumented Systems (SIS) — with the clear intention of causing a catastrophic safety and environmental incident.






Legal Notice